Introduction to Section 2
2.1 How to Get a Good Shell Account -- and Keep it
2.2 Hacking with Finger
2.3 Heroic Hacking in Half an Hour
(only appears in this third edition -- all about forging email)
2.4 How to Decipher Headers -- Even Forged Headers
2.5 Linux!
2.6 Port Surf's Up!
2.7 How to Map the Internet

Introduction to Section 4
4.1 How to Break into Computers
4.2 How to Fight Spammers
4.3 Email Bombs
4.4 Hacker War
4.5 Congratulations, you Have a Computer Virus
4.6 War Tools:
Scan, Sniff, Spoof and Hijack(Only
appears in this edition)
4.7 How Hackers Break in -- and How they Are Caught (Scientific
American article)
4.8 Busted!

Section 5: Hacker Culture

5.1 The History of Hacking
5.2 Real Hackers
5.3 How to Meet Other Hackers
5.4 Hacker Humor
Index